1 / 27

13-14 November 2013, UP

The role of authentication and eID interoperability in the access to scientific databases Fernando M. Silva Instituto Superior Técnico Lisboa , Portugal. 13-14 November 2013, UP. Outline. About Técnico Lisboa Access to scientific resources Authentication and eID eID interoperability

amalie
Download Presentation

13-14 November 2013, UP

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The role of authentication and eID interoperability in the access to scientific databasesFernando M. SilvaInstituto Superior TécnicoLisboa, Portugal 13-14 November 2013, UP

  2. Outline • About TécnicoLisboa • Access to scientific resources • Authentication and eID • eID interoperability • ID Federations • National eID • European developments on eID interoperability • Academic and research eID interoperability • Authentication infrastructure at TécnicoLisboa • Future trends and challenges

  3. About TécnicoLisboa

  4. Facts & Figures

  5. Research & education areas

  6. Graduate programmes • Bioengineering and Nanosystems • Biotechnology • Chemistry • Complex Transport Infrastructure Systems (w/ MIT) • Computer Science and Engineering • Construction and Rehabilitation • Information Systems and Computer Engineering • Materials Engineering • Mathematics and Applications • Mining and Geological Engineering • Naval Architecture and Marine Engineering • Pharmaceutical Engineering • Structural Engineering • Territorial Engineering • Transport Infrastructure Engineering • Transport Planning and Operation • Urban Studies and Territorial Management • Aerospace Engineering • Architecture • Biological Engineering • Biomedical Engineering • Biomedical Technologies • Chemical Engineering • Civil Engineering • Electrical and Computer Engineering • Engineering and Water Management • Environmental Engineering • Mechanical Engineering • Petroleum Engineering • Technological Physics Engineering • Communication Networks Engineering • Electronics Engineering • Engineering and Industrial Management • Information Systems and Computer Engineering

  7. Doctoral programmes • Aerospace Engineering • Architecture • Bioengineering • Biomedical Engineering • Biotechnology • Chemical Engineering • Chemistry • Civil Engineering • Climate Changes and Sustainable Development Policy • Computational Engineering • Computer Science and Engineering • Electrical and Computer Engineering • Engineering and Management • Engineering and Public Policy • Environmental Engineering • Geo-Resources • Information Security • Information Systems and Computer Engineering • Leaders for the Technical Industries • Materials Engineering • Mathematics • Mechanical Engineering • Naval Architecture and Marine Engineering • Physics • Refining, Petrochemical and Chemical Engineering • River Restoration and Management • Statistics and Stochastic Processes • Sustainable Energy Systems • Technological Change and Entrepreneurship • Technological Physics Engineering • Territorial Engineering • Transportation Lifelong PhD Graduate

  8. Access to scientific resources Open knowledge • Open data is a standard approach for delivering and publishing scientific data • Open data + • Open source + • Open access

  9. Authenticated access • User authentication is still required in the access to scientific resources in many real case scenarios • Legal constraints • Authorization constraints • Access auditing and monitoring • Other practical or functional reasons • Mandatory registration • …

  10. When registration / authentication is required • Internal/institutional users • Internal users may usually provide a fairly strong authentication by providing local access credentials • External users • In many real cases scenarios, a simple user registration is required in order to increase the confidence and user id reliability on data access • User registration is often performed adopting a simple e-mail authentication • Of course, e-mail authentication provides a quite “weak” user authentication for auditing and legal purposes.

  11. Federated identity management • Solution for providing user authentication and access across organizations • Common practice in academic and scientific organizations • Infrastructures mostly built around SAML and associated technologies • Further to provide cross organization authentication, identity federation are an excellent solution for providing authenticated services to userlessorganizations • NREN services • Portugal: RCTSaai identity federation

  12. Research and education ID federations Source: refeds.org

  13. Research and education ID federations in Europe Source: refeds.org

  14. Shibboleth authentication and authorization model

  15. eID authentication: going national • In the last few years, many countries started the integration of eID in national identity ID cards • National eIDsystems may be a convenient source of user authentication and authorization in several scenarios • Reliable underlying user authentication process • Strong authentication through physical security tokens • Support of broader authentication scenarios • Conventional eID federations (e. g., academic) are domain specific

  16. National eIDinteroperability • eID interoperability is a major pre-condition for the delivery of cross borders e-services • The EU has been promoting eID interoperability in several LSP projects addressing authentication and cross border services

  17. EU LSPs for promoting cross border services e-health e-procurement Cross-Borderprocedures e-justice eIDAuthentication, mandates & representation

  18. Generic view of coupling of eID and LSPs

  19. Academicandresearchareainlast LSP... ismissing Academic & Research/ CERIF shouldbe here... Semantics, Processes andDocuments e-Deliveryand e-Interaction Identity, SecurityandTrust

  20. Stork 2.0 authentication model Storkproject • eID integration and interoperability • Implementation of a proxy service (PEPS) in each member state • Optional support of a V-IdP for distributed solutions

  21. Authentication model at TécnicoLisboa • Single IdP infrastructure for all • ICT services: • Academic information services • Mail • VoIP • ERP systems • Procurement services • WiFi (eduroam) access • CPU resources • Storage resources • Web services • Desktop access • …

  22. eIDbuildingblocks Local authentication infrastructure LDAP (OpenLDAP) Authentication backend: Kerberos RADIUS (FreeRadius) Single Sign-On (SSO) support Central Authentication Service (Yale University) ID federation support Shibollet, OpenSAML - National Academic federation RCTSaai, FCCN RADIUS – Eduroam access (FCCN / TERENA) National eIDsuport (cartão de cidadão) Support of eID interoperability platform STORK, Stork 2.0 eSENS

  23. SSO login

  24. Ticketvalidation Ticket Ticket 1 5 6 2 4 3 Kerberos LDAP SSO: CAS model Authentication server Service Web Browser

  25. Clientimplementation: authenticationrequest Case 1: PHP code <?php include_once('CAS/CAS.php'); phpCAS::client(CAS_VERSION_2_0,'id.ist.utl.pt',443,'/cas'); phpCAS::forceAuthentication(); // Force authentication: browser redirected to IdP IF notauthenticated // Ifthecodereachesthisstep, theuserhasalreadybeenauthenticatedbythe CAS server     $user = phpCas::getUser(); //      [Specific server processing] phpCAS::logout(); // Logout ?> Case 2: mod_auth_cas installed on apache server Fill the .htaccess in selected directories AuthType CAS AuthName "IST Network Services" require user

  26. Conclusions • Authenticated access to scientific resourcesby external users can be easily provided by eID federations • Complexity is often hidden to the client process; • National eID systems offer a general purpose powerful authentication infrastructure • European eID authentication is already made possible by existing tools and infrastructures. • Extension of cross border services in European LSPs must be extended to research & academic domains. • Active promotion required…

  27. Thank you for your attention

More Related